TWI536175B - Updating files between computing devices via a wireless connection - Google Patents
Updating files between computing devices via a wireless connection Download PDFInfo
- Publication number
- TWI536175B TWI536175B TW104127493A TW104127493A TWI536175B TW I536175 B TWI536175 B TW I536175B TW 104127493 A TW104127493 A TW 104127493A TW 104127493 A TW104127493 A TW 104127493A TW I536175 B TWI536175 B TW I536175B
- Authority
- TW
- Taiwan
- Prior art keywords
- computing device
- file
- stored
- computing
- recently
- Prior art date
Links
- 230000015654 memory Effects 0.000 claims description 22
- 238000000034 method Methods 0.000 claims description 18
- 238000013500 data storage Methods 0.000 claims description 9
- 230000004044 response Effects 0.000 claims 1
- 230000001360 synchronised effect Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 3
- 239000000463 material Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 101000822695 Clostridium perfringens (strain 13 / Type A) Small, acid-soluble spore protein C1 Proteins 0.000 description 1
- 101000655262 Clostridium perfringens (strain 13 / Type A) Small, acid-soluble spore protein C2 Proteins 0.000 description 1
- 101000655256 Paraclostridium bifermentans Small, acid-soluble spore protein alpha Proteins 0.000 description 1
- 101000655264 Paraclostridium bifermentans Small, acid-soluble spore protein beta Proteins 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/178—Techniques for file synchronisation in file systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/023—Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Mobile Radio Communication Systems (AREA)
Description
本發明大體上係有關於在運算裝置間透過無線連結更新檔案之技術。 The present invention generally relates to techniques for updating a file over a wireless connection between computing devices.
運算裝置,如膝上型電腦、智慧型手機和平板電腦皆日趨普遍。許多人擁有至少一個(如果不是多個)這些類型的裝置,其可以經常被使用於一些任務,如查看電子郵件、瀏覽網頁、拍照、玩遊戲、以及其它這類型的活動。此外,這些裝置可被用來從裝載於其上之電腦應用軟體,如文字處理器應用軟體,建立檔案。 Computing devices such as laptops, smart phones and tablets are becoming more common. Many people have at least one, if not more, of these types of devices, which can often be used for tasks such as viewing emails, browsing web pages, taking photos, playing games, and other types of activities. In addition, these devices can be used to create files from computer application software loaded on them, such as word processor application software.
依據本發明之一可行實施例,特地提出一種方法,其包含:由一第一運算裝置在一第二運算裝置實體上鄰近該第一運算裝置時檢測出該第二運算裝置;在第一和第二運算裝置保持彼此實體上鄰近時,建立該第一與第二運算裝置彼此裝置間的一安全無線連結;針對儲存於第二運算裝置上之各檔案,由第一運算裝置判斷該檔案或儲存在第一運算裝置上的一相對應檔案是否為較新版本;以及針對儲存在第二運算裝置上的各檔案,由第一運算裝置把 該檔案及儲存於該第一運算裝置上之該相對應檔案更新為該較新版本。 According to a possible embodiment of the present invention, a method is specifically provided, comprising: detecting, by a first computing device, a second computing device when the second computing device is physically adjacent to the first computing device; When the second computing device is physically adjacent to each other, a secure wireless connection between the first computing device and the second computing device is established; and the file is determined by the first computing device for each file stored on the second computing device Whether a corresponding file stored on the first computing device is a newer version; and for each file stored on the second computing device, by the first computing device The file and the corresponding file stored on the first computing device are updated to the newer version.
100‧‧‧第一運算裝置/運算裝置/裝置 100‧‧‧First computing device/computing device/device
102、202‧‧‧處理資源 102, 202‧‧ ‧ Processing resources
104、204‧‧‧記憶體資源 104, 204‧‧‧ Memory resources
106、206‧‧‧資料儲存體 106, 206‧‧‧ data storage
108、208‧‧‧無線網路裝置 108, 208‧‧‧Wireless network devices
114、214‧‧‧系統匯流排 114, 214‧‧‧ system bus
130‧‧‧第二運算裝置/運算裝置/ 裝置 130‧‧‧Second computing device/computing device/ Device
132、232‧‧‧安全無線連結/安全連結 132, 232‧‧‧Secure wireless link/secure link
150‧‧‧實體鄰近/鄰近 150‧‧‧Entity proximity/adjacent
230‧‧‧第三運算裝置/裝置 230‧‧‧ third computing device/device
250‧‧‧實體鄰近 250‧‧‧Entity proximity
300‧‧‧方法 300‧‧‧ method
302~308‧‧‧步驟 302~308‧‧‧Steps
以下的詳細描述參照附圖,其中:圖1繪示根據一實例介於一第一運算裝置與實體上鄰近第一運算裝置之一第二運算裝置間的安全無線連結之方塊圖;圖2繪示根據一實例介於第二運算裝置與實體上鄰近第二運算裝置之一第三運算裝置間的安全無線連結之方塊圖;以及圖3係為描繪實現一實例之步驟的流程圖。 The following detailed description refers to the accompanying drawings in which: FIG. 1 is a block diagram showing a secure wireless connection between a first computing device and a second computing device physically adjacent to the first computing device according to an example; A block diagram of a secure wireless connection between a second computing device and a third computing device physically adjacent to one of the second computing devices is shown in accordance with an example; and FIG. 3 is a flow diagram depicting steps to implement an example.
由於一個使用者可能擁有多個運算裝置,由此使用者在一台裝置上建立的檔案可能無法在另一台裝置上自動或容易獲得。在一台運算裝置上建立和/或修改檔案,卻不能容易地或甚至全然無法從其他裝置使用該檔案,可能造成使用者不方便或是成為挫折的來源。例如,修改一個裝置上的檔案可能不會套用到位於其它裝置上的檔案。結果,將會導致在其它裝置上看到較舊版本檔案。 Since a user may have multiple computing devices, the files created by the user on one device may not be automatically or easily available on the other device. Creating and/or modifying a file on an computing device, but not easily or even completely unable to use the file from other devices, may be inconvenient or a source of frustration for the user. For example, modifying a file on one device may not apply to files located on other devices. As a result, it will result in seeing older version files on other devices.
本文所揭露的實例提供了允許最新版本的檔案在使用者所有運算裝置上可輕易取用的解決方案。作為一實例,使用者所持有之一運算裝置可充當一“檔案快取記憶體”,用以儲存使用者在其各種運算裝置上最近存取的檔案。此檔案快取記憶體可讓使用者所有運算裝置上有最 新版本檔案可供迅速取用,這部分稍後將進一步描述。使用者可能持有的運算裝置之範例包括但不限於:智慧型手機或是如智慧型手錶的可穿戴裝置。 The examples disclosed herein provide a solution that allows the latest version of the file to be easily accessed on all of the user's computing devices. As an example, one of the computing devices held by the user can act as a "file cache memory" for storing files recently accessed by the user on various computing devices. This file cache memory allows the user to have the most on all computing devices. The new version of the file is available for quick access, which will be further described later. Examples of computing devices that a user may hold include, but are not limited to, a smart phone or a wearable device such as a smart watch.
現請參照附圖,圖1繪示依據一實例,在包括至少一個第一運算裝置100之一系統、和實體鄰近150於第一運算裝置100的一第二運算裝置130之間的一安全無線連結132的方塊圖。如進一步所述,當運算裝置100、130保持實體鄰近狀態時,裝置100、130之間最近被使用的檔案可被同步化。所以,如果使用者持有第二運算裝置130,且之後實體上靠近另一台運算裝置(例如圖2中之第三運算裝置230),則第二運算裝置130與第三運算裝置間將會產生檔案同步化之動作。因此,該第三運算裝置即可使用最近從第一運算裝置100進行使用和/或修改的檔案。 Referring now to the drawings, FIG. 1 illustrates a secure wireless connection between a system including at least one first computing device 100 and a physical proximity 150 to a second computing device 130 of the first computing device 100, in accordance with an example. A block diagram of the link 132. As further described, when the computing devices 100, 130 remain in physical proximity, the most recently used files between the devices 100, 130 can be synchronized. Therefore, if the user holds the second computing device 130 and is then physically close to another computing device (such as the third computing device 230 in FIG. 2), then the second computing device 130 and the third computing device will Generate the action of file synchronization. Therefore, the third computing device can use the file that was recently used and/or modified from the first computing device 100.
依據各種實例,圖1包括特定之元件、模組等等。然而,根據本文敘述之指導,在不同實作態樣中,亦可用更多、更少和/或其他元件、模組、元件/模組佈局。此外,本文中所述之各種元件、模組等,可作為軟體模組、硬體模組、專用硬體(如特定應用硬體、特定應用積體電路(ASIC)、嵌入式控制器、硬佈線電路等)、或上述這些類型之某些組合來實現。 1 includes specific components, modules, and the like, in accordance with various examples. However, in accordance with the teachings herein, more, fewer, and/or other components, modules, component/module layouts may be used in different implementations. In addition, the various components, modules, etc. described herein can be used as software modules, hardware modules, dedicated hardware (such as specific application hardware, application-specific integrated circuits (ASIC), embedded controllers, hard Wiring circuits, etc., or some combination of these types are implemented.
第一運算裝置100可包括處理資源102,其大致代表能處理資料或解譯並執行指令的任何適當類型或形式之單個或多個處理單元。指令可儲存在諸如記憶體資源104之非暫態有形電腦可讀儲存媒體上、或在獨立裝置(圖 未示出)上、或在用以儲存指令以使可程式化處理器執行本文所描述之技術的任何其他類型之依電性或非依電性記憶體上。或者或額外地,第一運算裝置100可包括專用硬體,例如積體電路、特定應用積體電路(ASIC)、特定應用特殊處理器(ASSP)、可現場規劃閘陣列(FPGA)或前述專用硬體實例之任意組合,用以執行本文所述技術。在某些實作態樣中,多個處理器可適當地與多個記憶體和/或多種記憶體類型結合使用。 The first computing device 100 can include a processing resource 102 that generally represents a single or multiple processing units of any suitable type or form that can process data or interpret and execute instructions. The instructions may be stored on a non-transitory tangible computer readable storage medium such as memory resource 104, or on a standalone device (figure Not shown, or on any other type of electrical or non-electrical memory used to store instructions to enable the programmable processor to perform the techniques described herein. Alternatively or additionally, the first computing device 100 may comprise dedicated hardware, such as an integrated circuit, an application specific integrated circuit (ASIC), an application specific processor (ASSP), a field programmable gate array (FPGA), or the aforementioned dedicated Any combination of hardware examples to perform the techniques described herein. In some implementations, multiple processors may be suitably used in conjunction with multiple memories and/or multiple memory types.
除了處理資源102與記憶體資源104,第一運算裝置100可包括資料儲存體106用以儲存各種資料,如從諸如文字處理器應用軟體之裝載於裝置100上之電腦應用軟體所新建的檔案。圖1繪示之實例中,第一運算裝置100亦包括無線網路裝置108。然而,在其他實例中,可使用附加網路裝置。在所示實例中,無線網路裝置108有助於建立通到第二運算裝置130的安全連結132,後續有更詳細討論。 In addition to the processing resource 102 and the memory resource 104, the first computing device 100 can include a data storage unit 106 for storing various materials, such as files created from a computer application software such as a word processor application software loaded on the device 100. In the example illustrated in FIG. 1, the first computing device 100 also includes a wireless network device 108. However, in other examples, additional network devices may be used. In the illustrated example, wireless network device 108 facilitates establishing a secure connection 132 to second computing device 130, as discussed in more detail later.
所述構成第一運算裝置100的元件(例如處理資源102、記憶體資源104、資料儲存體106和無線網路裝置108),諸如利用電線、電纜和/或電子電路,經由系統匯流排114進行電子耦接,此匯流排可包括用以攜載資訊的資料匯流排、用以判斷資訊發送位置的位址匯流排、以及用以決定作業的控制匯流排。在其他實例中,亦可使用單獨匯流排而不是組合式系統匯流排;且不應將”系統匯流排”一詞解釋為侷限用於連結第一運算裝置100之元件的單個 或多個匯流排之類型。作為一實例,第二運算裝置130可具有與上文就第一運算裝置100所述者類似之元件。例如,參照圖2,第二運算裝置130可包括處理資源202、記憶體資源204、資料儲存體206和無線網路裝置208。上述構成第二運算裝置130的元件,諸如透過電線、電纜和/或電子電路經由系統匯流排214,而進行電子耦接。 The components constituting the first computing device 100 (eg, processing resource 102, memory resource 104, data store 106, and wireless network device 108), such as by wires, cables, and/or electronic circuitry, are routed through system bus 114 Electronically coupled, the bus bar can include a data bus for carrying information, an address bus for determining the location of the information, and a control bus for determining the job. In other examples, a separate bus bar may be used instead of a combined system bus bar; and the term "system bus bar" should not be interpreted as limiting the individual elements used to link the first computing device 100. Or the type of multiple bus bars. As an example, the second computing device 130 can have elements similar to those described above for the first computing device 100. For example, referring to FIG. 2, the second computing device 130 can include a processing resource 202, a memory resource 204, a data store 206, and a wireless network device 208. The components constituting the second computing device 130 described above are electronically coupled via a system bus 214, such as by wires, cables, and/or electronic circuitry.
實體鄰近150於第一運算裝置100的第二運算裝置130以無線通訊方式耦合於第一運算裝置100。應知,第二運算裝置130可包括任何適合類型的運算裝置,特別是使用者可能持有的裝置。使用者可能持有的運算裝置之例子包括但不限於:智慧型手機、平板電腦、膝上型電腦、如智慧型手錶之可穿戴式裝置、或相似產品。使用者持有運算裝置大部分或全部的時間裡,此運算裝置可作為一”檔案快取記憶體”用以儲存使用者在其各種運算裝置上最近存取的檔案。第二運算裝置130可含一作業系統,如安卓(Android®)、微軟視窗作業系統(Microsoft® Windows®)、蘋果電腦公司iOS作業系統(Apple® iOS®)或其他適合的作業系統。 The entity proximity 150 is coupled to the first computing device 100 in a wireless communication manner by the second computing device 130 of the first computing device 100. It should be understood that the second computing device 130 can include any suitable type of computing device, particularly a device that a user may hold. Examples of computing devices that a user may hold include, but are not limited to, a smart phone, a tablet, a laptop, a wearable device such as a smart watch, or the like. When the user holds the computing device for most or all of the time, the computing device can be used as a "file cache memory" for storing files recently accessed by the user on various computing devices. The second computing device 130 can include an operating system such as Android®, Microsoft® Windows®, Apple® iOS®, or other suitable operating system.
第二運算裝置130透過第一運算裝置100上之無線網路裝置108使用安全連結無線連結到第一運算裝置100。第二運算裝置130之使用者可請求與第一運算裝置100進行安全連結。然而,在其它實例中,這樣的請求可自動地發生(例如當第二運算裝置130鄰近150於第一運算裝置100時),而非依使用者請求。一旦第一運算裝置100接 收到該請求,第一運算裝置100透過無線網路裝置108建立安全連結132到第二運算裝置130。 The second computing device 130 is wirelessly coupled to the first computing device 100 via the wireless network device 108 on the first computing device 100 using a secure connection. The user of the second computing device 130 can request a secure connection with the first computing device 100. However, in other examples, such a request may occur automatically (eg, when the second computing device 130 is adjacent 150 to the first computing device 100), rather than as requested by the user. Once the first computing device 100 is connected Upon receipt of the request, the first computing device 100 establishes a secure connection 132 to the second computing device 130 via the wireless network device 108.
為建立安全連結132,第二運算裝置130應實體鄰近150於第一運算裝置100。實體鄰近150在圖1繪示為圍繞第一運算裝置100延伸一段距離之一區域。其距離依無線網路裝置108之信號強度或透過其他合適方法決定。于幾個實例中,此種距離可變化,且可為5英尺、10英尺、20英尺、25英尺、40英尺或其它合適的距離。若第二運算裝置130位在實體鄰近150範圍之外,第二運算裝置130則無法與第一運算裝置100形成安全連結132。 To establish a secure link 132, the second computing device 130 should be physically adjacent 150 to the first computing device 100. The physical proximity 150 is illustrated in FIG. 1 as extending a region of a distance around the first computing device 100. The distance is determined by the signal strength of the wireless network device 108 or by other suitable method. In several instances, such distances may vary and may be 5 feet, 10 feet, 20 feet, 25 feet, 40 feet, or other suitable distance. If the second computing device 130 is outside the range of the physical proximity 150, the second computing device 130 cannot form a secure connection 132 with the first computing device 100.
作為一實例,一檔案同步應用軟體可安裝在第一運算裝置100和使用者的其他運算裝置上。參照圖1,一旦第一運算裝置100偵測到第二運算裝置130已與之實體鄰近150(如藉由安裝在第一運算裝置上的檔案同步應用軟體),第一運算裝置100即可建立安全無線連結132。此安全連結132可在第一運算裝置100與第二運算裝置130間建立一網路,例如隨建即連網路或點對點(P2P)網路。資訊諸如透過遠端桌面協定連線期、虛擬私人網路連線期或其他合適安全的方法,在第一運算裝置100和第二運算裝置130間安全傳遞。舉例來說,第一運算裝置100和第二運算裝置130間交換的資料可受加密。安全無線連結132可在第二運算裝置130與第一運算裝置100實體鄰近150時保持連線狀態,且在第二運算裝置130移動超過實體鄰近150範圍之外時連結終止。 As an example, a file synchronization application software can be installed on the first computing device 100 and other computing devices of the user. Referring to FIG. 1, once the first computing device 100 detects that the second computing device 130 is adjacent to the entity 150 (eg, by the file synchronization application software installed on the first computing device), the first computing device 100 can be established. Secure wireless connection 132. The secure link 132 can establish a network between the first computing device 100 and the second computing device 130, such as a built-in network or a peer-to-peer (P2P) network. Information is securely transferred between the first computing device 100 and the second computing device 130, such as through a remote desktop protocol connection period, a virtual private network connection period, or other suitable security method. For example, the material exchanged between the first computing device 100 and the second computing device 130 can be encrypted. The secure wireless link 132 may remain in a wired state when the second computing device 130 is physically adjacent to the first computing device 100, and terminates when the second computing device 130 moves beyond the physical proximity 150.
一旦安全無線連結132建立,對於每個儲存在第二運算裝置130上的檔案,第一運算裝置100可判斷是否該檔案或者儲存在第一運算裝置100(例如在資料儲存體106)上的相對應檔案為較新版本。對於每個儲存在第二運算裝置130上的檔案,第一運算裝置100可透過安全無線連結132更新此檔案及其儲存在第一運算裝置100上的相對應檔案成較新版本。因此,儲存在第一運算裝置100和第二運算裝置130上的檔案即同步化,並可避免裝置100與130間存有多個版本的檔案。 Once the secure wireless link 132 is established, for each file stored on the second computing device 130, the first computing device 100 can determine whether the file or the phase stored on the first computing device 100 (eg, on the data store 106) The corresponding file is a newer version. For each file stored on the second computing device 130, the first computing device 100 can update the file and its corresponding file stored on the first computing device 100 into a newer version via the secure wireless link 132. Therefore, the files stored on the first computing device 100 and the second computing device 130 are synchronized, and multiple versions of files can be stored between the devices 100 and 130.
可能有檔案儲存在第一運算裝置100卻未儲存在第二運算裝置130的情況,及反之。例如,檔案可能已在另一運算裝置上建立,且在第二運算裝置130實體上鄰近於此另一運算裝置時與第二運算裝置130發生檔案同步化。作為一實例,第一運算裝置100可判斷儲存在第二運算裝置130的檔案是否儲存在第一運算裝置100之資料儲存體106中。第一運算裝置100若判斷該檔案不存在,則可透過安全無線連結132將此檔案複製到第一運算裝置之資料儲存體106。類似地,第一運算裝置100可判斷第一運算裝置100上儲存的最近取用的檔案是否儲存在第二運算裝置130上。如果最近取用檔案不存在第二運算裝置130中,第一運算裝置100可以透過安全無線連結132複製此等檔案到第二運算裝置130。結果,第二運算裝置130即可具有來自第一運算裝置100之最近取用檔案。 There may be cases where the file is stored in the first computing device 100 but not in the second computing device 130, and vice versa. For example, the file may have been created on another computing device, and file synchronization with the second computing device 130 occurs when the second computing device 130 is physically adjacent to the other computing device. As an example, the first computing device 100 can determine whether the file stored in the second computing device 130 is stored in the data storage body 106 of the first computing device 100. If the first computing device 100 determines that the file does not exist, the file can be copied to the data storage unit 106 of the first computing device via the secure wireless link 132. Similarly, the first computing device 100 can determine whether the most recently retrieved file stored on the first computing device 100 is stored on the second computing device 130. If the most recent access file is not present in the second computing device 130, the first computing device 100 can copy the files to the second computing device 130 via the secure wireless connection 132. As a result, the second computing device 130 can have the most recently accessed file from the first computing device 100.
因第二運算裝置130上之儲存空間可能有限,且 容量可能只夠儲存最近取用檔案(“檔案快取記憶體”),在複製任何檔案到第二運算裝置130前,第一運算裝置100可判斷第二運算裝置130是否具備足夠儲存空間。若第二運算裝置130確實不具有足夠儲存空間,第一運算裝置100可刪除第二運算裝置130上最近最少使用的檔案,以便容納來自於第一運算裝置100最近取用的檔案。作為一實例,確定第二運算裝置130儲存空間不足後,第二運算裝置130可接收來自第一運算裝置100要使其提供足夠空間給最近取用檔案的請求。此後,第二運算裝置130即可決定哪些檔案該刪除(例如最近最少使用的檔案)。經由確定第二運算裝置130具有足夠儲存空間,則第一運算裝置100可將最近取用檔案複製到第二運算裝置130。 Because the storage space on the second computing device 130 may be limited, and The capacity may only be enough to store the most recently retrieved file ("File Cache Memory"). Before copying any file to the second computing device 130, the first computing device 100 may determine whether the second computing device 130 has sufficient storage space. If the second computing device 130 does not have sufficient storage space, the first computing device 100 can delete the least recently used file on the second computing device 130 to accommodate the file recently taken by the first computing device 100. As an example, after determining that the second computing device 130 has insufficient storage space, the second computing device 130 can receive a request from the first computing device 100 to provide sufficient space for the most recently retrieved file. Thereafter, the second computing device 130 can determine which files should be deleted (eg, least recently used files). By determining that the second computing device 130 has sufficient storage space, the first computing device 100 can copy the most recently retrieved file to the second computing device 130.
當使用者可能持有之第二運算裝置130實體鄰近150於第一運算裝置100時,使用者即可取用與變更儲存在第一運算裝置100上的檔案。作為一實例,在第一運算裝置100和第二運算裝置130彼此保持在實體鄰近150範圍內之際,當儲存在第一運算裝置100上之資料儲存體106內的相對應檔案被取用和改變時,第一運算裝置100可以更新儲存於第二運算裝置130上的檔案。 When the second computing device 130 that the user may hold is physically adjacent to the first computing device 100, the user can access and change the file stored on the first computing device 100. As an example, when the first computing device 100 and the second computing device 130 are kept within the range of the physical proximity 150, the corresponding files stored in the data storage body 106 on the first computing device 100 are taken and used. When changing, the first computing device 100 can update the file stored on the second computing device 130.
圖2繪示第二運算裝置130與實體鄰近250於第二運算裝置130之一第三運算裝置230(例如主運算裝置)間根據一實例的一安全無線連結232之一方塊圖。如上所述,一使用者可擁有多個運算裝置。例如,第一運算裝置100(參照圖1)可為一桌上型電腦,而第三運算裝置230可為 一筆記型電腦。在一裝置(例如第一運算裝置100)上建立或修改的檔案可希望隨時能在另一裝置(例如第三運算裝置230)上被使用。 2 is a block diagram of a secure wireless connection 232 between the second computing device 130 and the physical proximity 250 between the third computing device 230 (eg, the primary computing device) of the second computing device 130, according to an example. As mentioned above, a user can have multiple computing devices. For example, the first computing device 100 (refer to FIG. 1) may be a desktop computer, and the third computing device 230 may be A notebook computer. A file created or modified on a device (e.g., first computing device 100) may be desired to be used on another device (e.g., third computing device 230) at any time.
參照圖2,一旦第二運算裝置130實體鄰近250於第三運算裝置230,即可在裝置130與230間建立安全無線連結232。一旦有安全連結232,最近取用的檔案可在裝置130與230間被同步化。作為一實例,最近從第一運算裝置100取用和/或更改的檔案,現在可在第二運算裝置130上透過安全無線連結132(例如參見圖1)取得,只要第二運算裝置130處於實體鄰近250於第三運算裝置230,檔案即可輕易地給第三運算裝置230取用。包括至少第一運算裝置100、第二運算裝置130以及第三運算裝置230的一系統,即可允許檔案,特別是最近取用的檔案,在此等裝置間保持同步化。例如,當使用者持有第二運算裝置130時,第二運算裝置130可在與第一運算裝置100或第三運算裝置230鄰近時與其配合將檔案同步化。 Referring to FIG. 2, once the second computing device 130 is physically adjacent 250 to the third computing device 230, a secure wireless connection 232 can be established between the devices 130 and 230. Once there is a secure connection 232, the most recently retrieved file can be synchronized between devices 130 and 230. As an example, files recently taken and/or changed from the first computing device 100 can now be retrieved over the second computing device 130 via a secure wireless connection 132 (see, for example, FIG. 1) as long as the second computing device 130 is in an entity. Adjacent to the third computing device 230, the file can be easily accessed by the third computing device 230. A system including at least the first computing device 100, the second computing device 130, and the third computing device 230 allows files, particularly recently accessed files, to be synchronized between devices. For example, when the user holds the second computing device 130, the second computing device 130 can cooperate with the first computing device 100 or the third computing device 230 to synchronize the files.
類似第一運算裝置100,第三運算裝置230可具有處理資源、記憶體資源、資料儲存體和無線網路裝置。作為一實例,第三運算裝置230可具有已安裝檔案同步應用軟體用以檢測運算裝置,如第二運算裝置130,是否進入實體鄰近250於第三運算裝置230之範圍內。然而,第二運算裝置130亦可安裝檔案同步應用軟體用來檢測它是否進入與第三運算裝置230實體鄰近250之範圍內。一旦在第二運算裝置130和第三運算裝置230間建立了安全無線連結 232,便可進行上述的檔案同步化之動作。 Similar to the first computing device 100, the third computing device 230 can have processing resources, memory resources, data stores, and wireless network devices. As an example, the third computing device 230 can have an installed file synchronization application software for detecting whether the computing device, such as the second computing device 130, enters the physical proximity 250 within the range of the third computing device 230. However, the second computing device 130 can also be installed with the file synchronization application software to detect whether it enters the physical proximity 250 of the third computing device 230. Once a secure wireless connection is established between the second computing device 130 and the third computing device 230 232, the above file synchronization can be performed.
貫穿本揭露所使用的安全連結132和232形成之網路,代表由允許共享資源和資訊的通訊頻道相互連接之普遍可得硬體元件以及電腦。該等網路包括透過電信連線、紅外線連線、射頻連線或任何其他連接器或是能提供電子通訊之系統的電纜、無線、光纖和/或遠端連結。該等網路至少部分可包括內部網路、網際網路或兩者之組合。該等網路甚至可包括中繼代理器、路由器、交換機、負載平衡器和其他類似設備。 The network formed by the secure links 132 and 232 used throughout this disclosure represents a generally available hardware component and computer interconnected by communication channels that allow sharing of resources and information. Such networks include cable, wireless, fiber optic and/or remote connections through telecommunication connections, infrared connections, radio frequency connections or any other connector or system capable of providing electronic communication. The networks may include, at least in part, an internal network, an internet, or a combination of both. These networks may even include relay agents, routers, switches, load balancers, and other similar devices.
參照圖3,其繪示符合各種實例之一流程圖。該流程圖以特定順序繪示出用以在使用者多部運算裝置間將檔案尤其是最近取用的檔案同步化的一些程序。此等程序之順序並不欲限制本揭露旨意。相反地,明確希望的是,單個或多個程序可能會以不同順序或同時進行。本揭露並不限於特定實例。 Referring to Figure 3, a flow chart consistent with one of the various examples is illustrated. The flowchart depicts, in a particular order, some of the programs used to synchronize files, particularly recently accessed files, between multiple computing devices of a user. The order of such procedures is not intended to limit the scope of the disclosure. Conversely, it is expressly contemplated that a single or multiple programs may be performed in a different order or concurrent. The disclosure is not limited to a specific example.
一方法300可開始並進展至步驟302,其中在第二運算裝置實體上鄰近於第一運算裝置時,第一運算裝置可偵測到第二運算裝置。 A method 300 can begin and progress to step 302, wherein the first computing device can detect the second computing device when the second computing device is physically adjacent to the first computing device.
進展至步驟304,在第一和第二運算裝置保持在彼此實體上鄰近之狀態時,第一運算裝置可在第一和第二運算裝置間建立一安全無線連結。 Proceeding to step 304, the first computing device can establish a secure wireless connection between the first and second computing devices while the first and second computing devices remain in physical proximity to each other.
進展至步驟306,對於儲存在第二運算裝置上的每個檔案,第一運算裝置可判斷是否該檔案或存在第一運算裝置上的相對應檔案為較新版本。 Proceeding to step 306, for each file stored on the second computing device, the first computing device can determine whether the file or the corresponding file on the first computing device is a newer version.
進展至步驟308,對於儲存在第二運算裝置上的各檔案,第一運算裝置可更新該檔案以及儲存在第一運算裝置上之相對應檔案至較新版本。作為一實例,在第一和第二運算裝置保持互相實體上鄰近時,若第一運算裝置上儲存的相對應檔案被取用和變更,則儲存在第二運算裝置上的檔案即可被更新。 Proceeding to step 308, for each file stored on the second computing device, the first computing device can update the file and the corresponding file stored on the first computing device to a newer version. As an example, when the first and second computing devices are physically adjacent to each other, if the corresponding file stored on the first computing device is accessed and changed, the file stored in the second computing device can be updated. .
作為一實例,第一運算裝置可判斷第一運算裝置上儲存的最近取用檔案是否有儲存在第二運算裝置上,且若該檔案未儲存在第二運算裝置上,則會複製該最近取用檔案到第二運算裝置。若第一運算裝置判定第二運算裝置儲存空間不足以容納最近取用檔案,第一運算裝置可從第二運算裝置刪除最近最少使用的檔案,以便容納最近取用檔案。 As an example, the first computing device may determine whether the most recently retrieved file stored on the first computing device is stored in the second computing device, and if the file is not stored in the second computing device, copying the recent fetching Use the file to the second computing device. If the first computing device determines that the second computing device has insufficient storage space to accommodate the most recently accessed file, the first computing device may delete the least recently used file from the second computing device to accommodate the most recently accessed file.
類似地,第一運算裝置可判斷是否儲存在第二運算裝置上之一檔案亦儲存於第一運算裝置上。如果檔案未儲存在第一運算裝置上,該檔案可從第二運算裝置複製到第一運算裝置。 Similarly, the first computing device can determine whether a file stored on the second computing device is also stored on the first computing device. If the file is not stored on the first computing device, the file can be copied from the second computing device to the first computing device.
舉例來說,若使用者持有第二運算裝置,且稍後實體上靠近到第三運算裝置,第三運算裝置可偵測第二運算裝置並建立一安全無線連結。若第二和第三運算裝置保持彼此實體相鄰近,此安全無線連結可以維持連線狀態。第二和第三運算裝置間的檔案則可被同步化,特別是最近取用的檔案。作為一實例,第三運算裝置可把與在第二運算裝置實體上鄰近第一運算裝置時被同步化之檔案相對應 的檔案,從第二運算裝置複製過來。 For example, if the user holds the second computing device and is physically close to the third computing device, the third computing device can detect the second computing device and establish a secure wireless connection. The secure wireless link can maintain a wired state if the second and third computing devices remain physically adjacent to each other. The files between the second and third computing devices can be synchronized, especially recently accessed files. As an example, the third computing device may correspond to a file that is synchronized when the second computing device is physically adjacent to the first computing device. The file is copied from the second computing device.
要強調的是,上述實例僅為可能的實作範例,且闡述來供清楚地瞭解本發明揭露內容。在不實質違背本揭露之精神和原則下,可對上述示例作諸多變化和修改。此外,本揭露之範圍意欲包含上述所論之全部元素、特徵與層面的任何與所有合適組合和次組合。所有此類適度的修改與更動皆欲包括在本發明揭露範圍內,且本揭露支持針對諸元件或步驟之各個層面或組合的所有可能申請專利範圍。 It is to be emphasized that the above examples are only possible examples of implementation and are set forth to provide a clear understanding of the present disclosure. Many changes and modifications may be made to the above examples without departing from the spirit and principles of the disclosure. In addition, the scope of the disclosure is intended to embrace any and all suitable combinations and sub-combinations All such modest modifications and variations are intended to be included within the scope of the present disclosure, and the disclosure is intended to cover all possible scope of the application.
300‧‧‧方法 300‧‧‧ method
302~308‧‧‧步驟 302~308‧‧‧Steps
Claims (15)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2014/052864 WO2016032455A1 (en) | 2014-08-27 | 2014-08-27 | Updating files between computing devices via a wireless connection |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201617920A TW201617920A (en) | 2016-05-16 |
TWI536175B true TWI536175B (en) | 2016-06-01 |
Family
ID=55400176
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW104127493A TWI536175B (en) | 2014-08-27 | 2015-08-24 | Updating files between computing devices via a wireless connection |
Country Status (5)
Country | Link |
---|---|
US (1) | US10616328B2 (en) |
EP (1) | EP3186716B1 (en) |
CN (1) | CN106233274B (en) |
TW (1) | TWI536175B (en) |
WO (1) | WO2016032455A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10382399B2 (en) * | 2014-03-10 | 2019-08-13 | Hewlett-Packard Development Company, L.P. | Providing an operating system session |
WO2016048344A1 (en) * | 2014-09-26 | 2016-03-31 | Hewlett Packard Enterprise Development Lp | Caching nodes |
US20160337370A1 (en) * | 2015-05-13 | 2016-11-17 | Sony Computer Entertainment America Llc | Portable profile access token |
CN108228894B (en) * | 2018-02-05 | 2023-07-04 | 腾讯科技(深圳)有限公司 | Method, device and terminal for checking recently used files |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7743022B2 (en) | 2003-02-28 | 2010-06-22 | Microsoft Corporation | Method and system for synchronizing data shared among peer computing devices |
US7644239B2 (en) | 2004-05-03 | 2010-01-05 | Microsoft Corporation | Non-volatile memory cache performance improvement |
US20090150569A1 (en) | 2007-12-07 | 2009-06-11 | Avi Kumar | Synchronization system and method for mobile devices |
US8745127B2 (en) | 2008-05-13 | 2014-06-03 | Microsoft Corporation | Blending single-master and multi-master data synchronization techniques |
US8103718B2 (en) | 2008-07-31 | 2012-01-24 | Microsoft Corporation | Content discovery and transfer between mobile communications nodes |
KR20100109352A (en) * | 2009-03-31 | 2010-10-08 | 삼성전자주식회사 | Apparatus and method for bidirectional real-time synchronization through wireless connection |
US9276896B2 (en) | 2011-06-27 | 2016-03-01 | Kaseya Limited | Method and apparatus of establishing a connection between devices using cached connection information |
US9823917B2 (en) * | 2011-10-20 | 2017-11-21 | Facebook, Inc. | Update application user interfaces on client devices |
WO2013082320A1 (en) | 2011-11-29 | 2013-06-06 | Box, Inc. | Mobile platform file and folder selection functionalities for offline access and synchronization |
US9307006B2 (en) | 2012-04-11 | 2016-04-05 | Salesforce.Com, Inc. | System and method for synchronizing data objects in a cloud based social networking environment |
US20130304901A1 (en) * | 2012-05-11 | 2013-11-14 | James Malnati | Automated integration of disparate system management tools |
US20140013100A1 (en) | 2012-07-05 | 2014-01-09 | Martin M. Menzel | Establish bidirectional wireless communication between electronic devices using visual codes |
US8984582B2 (en) | 2012-08-14 | 2015-03-17 | Confidela Ltd. | System and method for secure synchronization of data across multiple computing devices |
US9094868B2 (en) * | 2012-10-15 | 2015-07-28 | Headwater Partners Ii Llc | User equipment link quality estimation based on positioning |
US9678978B2 (en) | 2012-12-31 | 2017-06-13 | Carbonite, Inc. | Systems and methods for automatic synchronization of recently modified data |
-
2014
- 2014-08-27 WO PCT/US2014/052864 patent/WO2016032455A1/en active Application Filing
- 2014-08-27 EP EP14900344.4A patent/EP3186716B1/en active Active
- 2014-08-27 CN CN201480078328.3A patent/CN106233274B/en active Active
- 2014-08-27 US US15/306,688 patent/US10616328B2/en not_active Expired - Fee Related
-
2015
- 2015-08-24 TW TW104127493A patent/TWI536175B/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
CN106233274A (en) | 2016-12-14 |
EP3186716B1 (en) | 2024-02-28 |
EP3186716A4 (en) | 2018-03-07 |
WO2016032455A1 (en) | 2016-03-03 |
US20170063987A1 (en) | 2017-03-02 |
CN106233274B (en) | 2020-01-07 |
TW201617920A (en) | 2016-05-16 |
EP3186716A1 (en) | 2017-07-05 |
US10616328B2 (en) | 2020-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9569240B2 (en) | Method and system to provision and manage a computing application hosted by a virtual instance of a machine | |
US9852308B2 (en) | Apparatuses, systems, methods, and computer readable media for providing secure file-deletion functionality | |
TWI536175B (en) | Updating files between computing devices via a wireless connection | |
KR101997176B1 (en) | Peer-to-peer software updates | |
EP3036659B1 (en) | Redirecting local storage to cloud storage | |
US9697225B2 (en) | Method for synchronizing file | |
US9177122B1 (en) | Managing secure firmware updates | |
EP2755136B1 (en) | Remote backup system and remote backup method thereof | |
US20170171295A1 (en) | File upload and download methods and associated server | |
RU2700188C2 (en) | Representing computing environment on multiple devices | |
EP2836937B1 (en) | Method and apparatus for facilitating switching between devices | |
TW201730790A (en) | Method, device and system for migrating physical machine data to cloud | |
US9411783B2 (en) | Method and apparatus for selective synchronization of a display layout | |
JP2014130388A (en) | Information processor, and information processing method | |
JP6482204B2 (en) | Information processing terminal, control method thereof, and program | |
TWI505100B (en) | Method for sharing and synchronizing data in local area network | |
WO2020044977A1 (en) | Application program and data transfer system | |
CN109144638B (en) | Android horizontal and vertical screen data synchronization method and device, terminal and readable medium | |
US20140137092A1 (en) | Information processing apparatus, information processing system, non-transitory computer-readable storage medium having stored therein information processing program, and information processing method | |
JP2015153266A (en) | firmware management system, method, and program | |
JP2007004301A (en) | Computer, data processing method, program and communication method | |
JP2014052970A (en) | Devices pairing method and devices | |
EP3131241B1 (en) | Control method and control device | |
US10200499B1 (en) | Systems and methods for reducing network traffic by using delta transfers | |
US10038728B2 (en) | Communication terminal and communication processing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |